General

  • Target

    oitam.zip

  • Size

    8.9MB

  • Sample

    231023-yk8gtsfh67

  • MD5

    0d5f921051f81fce17b29c61b94ca3a7

  • SHA1

    84cf8e3c3c93aa8464ae23b50bd1c44a5470a7b6

  • SHA256

    3a308f175cf1311d8584265c7996d033810c763d458e7648db523dcbd08988de

  • SHA512

    28ce31d27392696eb04eb205c872c2ecdb38696012a5b0a2a20bac9984ebfb535ef47f1c8e204f0b6909673882bb07e9db1b4c6050a6ddee7391b3cb1c47a628

  • SSDEEP

    196608:eDh1kd/Y68NzyATGHwUPzf2n80S4rzgnEFQlPuGNX2R5s/W26vasgxt:e1kd/YZpYPPz281Y0EuVuGNGPs/6vgxt

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://voodmastrelinux.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    vBojMjKiOxwdob

  • internal_mutex

    txtMut

  • minimum_disk

    35

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      oitam.msi

    • Size

      9.1MB

    • MD5

      8ef6bc142843232614b092fac948562d

    • SHA1

      0e532489d6c1f1abc59941e9cb41cb38dcf8ac6e

    • SHA256

      de3f49e68c45db2f31d1cc1d10ff09f8cfce302b92a1f5361c8f34c3d78544e5

    • SHA512

      47d0874993410954abd0957c06bdd8d9534218d766032fac6f35b9b2614615d46ae263a7eea5e3979ce57ee5790b78f39cb1278e44db19446ca1e62c29dfcb3a

    • SSDEEP

      196608:5hbWzPMCeNrs0rczeuNr/QnMOsaB9QVuHSzdUupBqbHSDjs6cvUOzZx:PbWzPM5HCZNrgMVw6wyZUupkjSPcvXx

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks